全文获取类型
收费全文 | 1269篇 |
免费 | 52篇 |
专业分类
电工技术 | 11篇 |
综合类 | 1篇 |
化学工业 | 313篇 |
金属工艺 | 27篇 |
机械仪表 | 33篇 |
建筑科学 | 45篇 |
矿业工程 | 2篇 |
能源动力 | 60篇 |
轻工业 | 103篇 |
水利工程 | 6篇 |
石油天然气 | 6篇 |
无线电 | 115篇 |
一般工业技术 | 260篇 |
冶金工业 | 100篇 |
原子能技术 | 11篇 |
自动化技术 | 228篇 |
出版年
2023年 | 8篇 |
2022年 | 17篇 |
2021年 | 32篇 |
2020年 | 25篇 |
2019年 | 19篇 |
2018年 | 22篇 |
2017年 | 36篇 |
2016年 | 37篇 |
2015年 | 30篇 |
2014年 | 39篇 |
2013年 | 84篇 |
2012年 | 74篇 |
2011年 | 77篇 |
2010年 | 68篇 |
2009年 | 76篇 |
2008年 | 74篇 |
2007年 | 61篇 |
2006年 | 61篇 |
2005年 | 52篇 |
2004年 | 37篇 |
2003年 | 35篇 |
2002年 | 31篇 |
2001年 | 21篇 |
2000年 | 13篇 |
1999年 | 24篇 |
1998年 | 34篇 |
1997年 | 19篇 |
1996年 | 18篇 |
1995年 | 17篇 |
1994年 | 17篇 |
1993年 | 14篇 |
1992年 | 9篇 |
1991年 | 14篇 |
1990年 | 12篇 |
1989年 | 9篇 |
1988年 | 6篇 |
1987年 | 12篇 |
1986年 | 9篇 |
1985年 | 9篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 6篇 |
1981年 | 10篇 |
1980年 | 5篇 |
1979年 | 7篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1974年 | 4篇 |
排序方式: 共有1321条查询结果,搜索用时 15 毫秒
91.
Constraint Programming (CP) offers a rich modeling language of constraints embedding efficient algorithms to handle complex and heterogeneous combinatorial problems. To solve hard combinatorial optimization problems using CP alone or hybrid CP-ILP decomposition methods, costs also have to be taken into account within the propagation process. Optimization constraints, with their cost-based filtering algorithms, aim to apply inference based on optimality rather than feasibility. This paper introduces a new optimization constraint, cost-regular. Its filtering algorithm is based on the computation of shortest and longest paths in a layered directed graph. The support information is also used to guide the search for solutions. We believe this constraint to be particularly useful in modeling and solving Column Generation subproblems and evaluate its behaviour on complex Employee Timetabling Problems through a flexible CP-based column generation approach. Computational results on generated benchmark sets and on a complex real-world instance are given.A preliminary version of this paper appeared as [7]. This research was supported by the Mathematics of Information Technology and Complex Systems (MITACS) Internship program in association with Omega Optimisation Inc. (CA). 相似文献
92.
A branch and bound strategy is proposed for solving the clusterwise regression problem, extending Brusco's repetitive branch and bound algorithm (RBBA). The resulting strategy relies upon iterative heuristic optimization, new ways of observation sequencing, and branch and bound optimization of a limited number of ending subsets. These three key features lead to significantly faster optimization of the complete set and the strategy has more general applications than only for clusterwise regression. Additionally, an efficient implementation of incremental calculations within the branch and bound search algorithm eliminates most of the redundant ones. Experiments using both real and synthetic data compare the various features of the proposed optimization algorithm and contrasts them against a benchmark mixed logical-quadratic programming formulation optimized by CPLEX. The results indicate that all components of the proposed algorithm provide significant improvements in processing times, and, when combined, generally provide the best performance, significantly outperforming CPLEX. 相似文献
93.
Baker and Cirinei (Lecture Notes in Computer Science, vol. 4878, Springer, pp. 62–75, 2007) have introduced an exact but naive algorithm, that consists in solving a state reachability problem in a finite automaton, to check whether a set of sporadic hard real-time tasks is schedulable on an identical multiprocessor platform. However, this algorithm suffers from poor performance due to the exponential size of the automaton relative to the size of the task set. In this paper, we build on the work of Baker and Cirinei, and rely on their formalism to characterise the complexity of this problem. We prove that it is PSpace-complete. In order to obtain an algorithm that is applicable in practice to systems of realistic sizes, we successfully apply techniques developed by the formal verification community, specifically antichain techniques (Doyen and Raskin in Lecture Notes in Computer Science, vol. 6015, Springer, pp. 2–22, 2010) to this scheduling problem. For that purpose, we define and prove the correctness of a simulation relation on Baker and Cirinei’s automaton. We show that our improved algorithm yields dramatically improved performance for the schedulability test and opens for many further improvements. This work is an extended and revised version of a previous conference paper by the same authors (Lindström et al., Proceedings of the 19th International Conference on Real-Time and Network Systems (RTNS 2011), pp. 25–34, 2011). 相似文献
94.
This paper is concerned with the computation of the skeleton of a shape Ω included in ?2. We show some connections between the Euclidean distance function d to ?Ω and the solution u of the Poisson problem Δu(x)=?1 if x is in Ω and u(x)=0 if x is on ?Ω. This enables us to propose a new and fast algorithm to compute an approximation of the skeleton of ?Ω. We illustrate the approach with some numerical experiments. 相似文献
95.
The purpose of this article is to illustrate the potential interest of the control theory framework for cryptographic applications. It is shown that under the properties of left invertibility and flatness, dynamical systems are structurally equivalent to some specific cryptographic primitives called self-synchronising stream ciphers. After having motivated the interest of considering hybrid systems for such ciphers, the development is particularised for the special class of switched linear systems. We also show that identifiability is a necessary condition for security, and we describe an identification procedure as a possible attack and assess its complexity. 相似文献
96.
Tegawendé F. Bissyandé Laurent Réveillère Julia L. Lawall Gilles Muller 《Automated Software Engineering》2016,23(1):3-41
The Linux kernel does not export a stable, well-defined kernel interface, complicating the development of kernel-level services, such as device drivers and file systems. While there does exist a set of functions that are exported to external modules, this set of functions frequently changes, and the functions have implicit, ill-documented preconditions. No specific debugging support is provided. We present Diagnosys, an approach to automatically constructing a debugging interface for the Linux kernel. First, a designated kernel maintainer uses Diagnosys to identify constraints on the use of the exported functions. Based on this information, developers of kernel services can then use Diagnosys to generate a debugging interface specialized to their code. When a service including this interface is tested, it records information about potential problems. This information is preserved following a kernel crash or hang. Our experiments show that the generated debugging interface provides useful log information and incurs a low performance penalty. 相似文献
97.
This paper considers the problem of electing an eventual leader in an asynchronous shared memory system. While this problem
has received a lot of attention in message-passing systems, very few solutions have been proposed for shared memory systems.
As an eventual leader cannot be elected in a pure asynchronous system prone to process crashes, the paper first proposes to
enrich the asynchronous system model with an additional assumption. That assumption (denoted AWB) is particularly weak. It is made up of two complementary parts. More precisely, it requires that, after some time, (1) there
is a process whose write accesses to some shared variables be timely, and (2) the timers of (t−f) other processes be asymptotically well-behaved (t denotes the maximal number of processes that may crash, and f the actual number of process crashes in a run). The asymptotically well-behaved timer notion is a new notion that generalizes and weakens the traditional notion of timers whose durations are required to
monotonically increase when the values they are set to increase (a timer works incorrectly when it expires at arbitrary times,
i.e., independently of the value it has been set to).
The paper then focuses on the design of t-resilient AWB-based eventual leader protocols. “t-resilient” means that each protocol can cope with up to t process crashes (taking t=n−1 provides wait-free protocols, i.e., protocols that can cope with any number of process failures). Two protocols are presented.
The first enjoys the following noteworthy properties: after some time only the elected leader has to write the shared memory,
and all but one shared variables have a bounded domain, be the execution finite or infinite. This protocol is consequently
optimal with respect to the number of processes that have to write the shared memory. The second protocol guarantees that
all the shared variables have a bounded domain. This is obtained at the following additional price: t+1 processes are required to forever write the shared memory. A theorem is proved which states that this price has to be paid
by any protocol that elects an eventual leader in a bounded shared memory model. This second protocol is consequently optimal
with respect to the number of processes that have to write in such a constrained memory model. In a very interesting way,
these protocols show an inherent tradeoff relating the number of processes that have to write the shared memory and the bounded/unbounded
attribute of that memory. 相似文献
98.
César Muñoz Víctor Carreño Gilles Dowek Ricky Butler 《International Journal on Software Tools for Technology Transfer (STTT)》2003,4(3):371-380
Safety assessment of new air traffic management systems is a main issue for civil aviation authorities. Standard techniques
such as testing and simulation have serious limitations in new systems that are significantly more autonomous than the older
ones. In this paper, we present an innovative approach for establishing the correctness of conflict detection systems. Fundamental
to our approach is the concept of trajectory, and how we represent a continuous physical trajectory by a continuous path in
the x-y plane constrained by physical laws and operational requirements. From the model of trajectories, we extract, and formally
prove, high-level properties that can serve as a framework to analyze conflict scenarios. We use the AILS (Airborne Information
for Lateral Spacing) alerting algorithm as a case study of our approach.
Published online: 19 November 2002 相似文献
99.
Gilles Celeux Author VitaeFlorence ForbesAuthor Vitae Nathalie Peyrard Author Vitae 《Pattern recognition》2003,36(1):131-144
Image segmentation using Markov random fields involves parameter estimation in hidden Markov models for which the EM algorithm is widely used. In practice, difficulties arise due to the dependence structure in the models and approximations are required. Using ideas from the mean field approximation principle, we propose a class of EM-like algorithms in which the computation reduces to dealing with systems of independent variables. Within this class, the simulated field algorithm is a new stochastic algorithm which appears to be the most promising for its good performance and speed, on synthetic and real image experiments. 相似文献
100.
Datacentric applications are still a challenging issue for large-scale distributed computing systems. The emergence of new protocols and software for collaborative content distribution over the Internet offers a new opportunity for efficient and fast delivery of a high volume of data. This paper presents an evaluation of the BitTorrent protocol for computational desktop grids. We first present a prototype of a generic subsystem dedicated to data management and designed to serve as a building block for any desktop grid system. Based on this prototype we conduct experiments to evaluate the potential of BitTorrent compared to a classical approach based on FTP data server. The preliminary results obtained with a 65-node cluster measure the basic characteristics of BitTorrent in terms of latency and bandwidth and evaluate the scalability of BitTorrent for the delivery of large input files. Moreover, we show that BitTorrent has a considerable latency overhead compared to FTP but clearly outperforms FTP when distributing large files or files to a high number of nodes. Tests on a synthetic application show that BitTorrent significantly increases the communication/computation ratio of the applications eligible to run on a desktop grid system. 相似文献